Venafi, the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions, in conjunction with Echelon One, an IT security research leader specializing in security programs and guidance, today released the 2011 IT Security Best Practices Assessment. Echelon One led the effort to establish a set of 12 best practices and worked closely with Venafi to evaluate how well 420 enterprises and government agencies implemented them. The assessment revealed an epidemic of security worst practices, with a majority of organizations failing to adhere to simple data protection standards. In many cases, it also revealed that many organizations are critically unaware of what security practices are currently in place.
“The assessment findings were startling. We suspected we would find that many organizations were challenged, but we had no idea that failure rates would run this high,” said Bob West, founder and CEO of Echelon One. “The good news is that with this information and free self assessment, organizations can see where they rank in comparison to peers, and determine where weaknesses exist. They can identify steps to significantly reduce security and compliance risks by leveraging automated processes with multi-layered data security strategies, including managed encryption.”
The assessment evaluated where organizations rank in the implementation of 12 IT security and compliance best practices, ranging from how organizations leverage and manage encryption to how often they conduct security awareness and training programs. The top five best practices, their high failure rates, and recommendations for mitigation include:
The assessment further revealed that almost 100 percent of evaluated organizations had some degree of security, compliance or operational risk.
“The biggest security struggle organizations face today is managing the unknown—a.k.a. the unquantified and unmanaged risks. Your best security assets can easily turn into liabilities if not managed properly,” said Jeff Hudson, CEO of Venafi. “If this assessment demonstrates anything, it’s that IT and security departments have got to gain greater visibility over all of their security and compliance activities, and take steps to better understand and manage them.”
The Venafi 2011 IT Security Best Practices Assessment evaluated 420 participant organizations through an independent online survey conducted in July. Sixty percent of the evaluated organizations employ large workforces of 5,000 or more employees. Respondent organizations came from multiple industries, including banking and financial services (27%), high tech (14%), government (11%), and manufacturing (8%).
Questions and best practices baselines were established in conjunction with IT security research firm Echelon One, under the leadership of founder and CEO Bob West. To develop the evaluation and baselines, West drew on his constant interactions with his Fortune 500 customers and his 20–plus years of IT security experience in former positions such as CISO of Fifth Third Bank.
Get social with Venafi, interact on:
Facebook: http://www.facebook.com/Venafi
Twitter: @Venafi
LinkedIn: http://www.linkedin.com/company/venafi
YouTube: http://www.youtube.com/user/Venafi
Blog: www.venafi.com/blog/
Lorem ipsum dolor sit amet, consectetur elit.
Thank you for subscription
Scroll to the bottom to accept
VENAFI CLOUD SERVICE
*** IMPORTANT ***
PLEASE READ CAREFULLY BEFORE CONTINUING WITH REGISTRATION AND/OR ACTIVATION OF THE VENAFI CLOUD SERVICE (“SERVICE”).
This is a legal agreement between the end user (“You”) and Venafi, Inc. ("Venafi" or “our”). BY ACCEPTING THIS AGREEMENT, EITHER BY CLICKING A BOX INDICATING YOUR ACCEPTANCE AND/OR ACTIVATING AND USING THE VENAFI CLOUD SERVICE FOR WHICH YOU HAVE REGISTERED, YOU AGREE TO THE TERMS OF THIS AGREEMENT. IF YOU ARE ENTERING INTO THIS AGREEMENT ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY AND ITS AFFILIATES TO THESE TERMS AND CONDITIONS, IN WHICH CASE THE TERMS "YOU" OR "YOUR" SHALL REFER TO SUCH ENTITY AND ITS AFFILIATES. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS, YOU MUST NOT ACCEPT THIS AGREEMENT AND MAY NOT USE THE SERVICE.
You shall not access the Service if You are Our competitor or if you are acting as a representative or agent of a competitor, except with Our prior written consent. In addition, You shall not access the Service for purposes of monitoring its availability, performance or functionality, or for any other benchmarking or competitive purposes, and you shall not perform security vulnerability assessments or penetration tests without the express written consent of Venafi.
This Agreement was last updated on April 12, 2017. It is effective between You and Venafi as of the date of Your accepting this Agreement.
The Venafi Cloud Service includes two separate services that are operated by Venafi as software as a service, each of which is separately licensed pursuant to the terms and conditions of this Agreement and each of which is considered a Service under this Agreement: the Venafi Cloud Risk Assessment Service or the Venafi Cloud for DevOps Service. Your right to use either Service is dependent on the Service for which You have registered with Venafi to use.
This License is effective until terminated as set forth herein or the License Term expires and is not otherwise renewed by the parties. Venafi may terminate this Agreement and/or the License at any time with or without written notice to You if You fail to comply with any term or condition of this Agreement or if Venafi ceases to make the Service available to end users. You may terminate this Agreement at any time on written notice to Venafi. Upon any termination or expiration of this Agreement or the License, You agree to cease all use of the Service if the License is not otherwise renewed or reinstated. Upon termination, Venafi may also enforce any rights provided by law. The provisions of this Agreement that protect the proprietary rights of Venafi will continue in force after termination.
This Agreement shall be governed by, and any arbitration hereunder shall apply, the laws of the State of Utah, excluding (a) its conflicts of laws principles; (b) the United Nations Convention on Contracts for the International Sale of Goods; (c) the 1974 Convention on the Limitation Period in the International Sale of Goods; and (d) the Protocol amending the 1974 Convention, done at Vienna April 11, 1980.
In the meantime, please explore more of our solutions
In the meantime, please explore more of our solutions
This site uses cookies to offer you a better experience. If you do not want us to use cookies, please update your browser settings accordingly. Find out more on how we use cookies.